Name | Title | Contact Details |
---|
Intelligent Computer Solutions is a Chatsworth, CA-based company in the Computers and Electronics sector.
SECURE MISSION SOLUTIONS is a Reston, VA-based company in the Computers and Electronics sector.
Blue Cedar Networks was founded on the principle that the app is the optimal control endpoint for the modern organization. The Atlas platform provides our customers with the most secure, scalable, and user-friendly capabilities to safely and seamlessly connect and protect their enterprise apps across the extended enterprise — the user population comprised of employees and non-employees that can drive or derive value from those apps and data. Blue Cedar Networks has over 150 customers spanning every major industry vertical, including some of the largest financial services, wireless and telecommunications, CPG, manufacturing, healthcare, and government organizations in the world.
CloudPassage® Halo® is the world`s leading security and compliance automation platform that provides instant visibility and continuous protection for servers in any combination of data centers, private clouds and public clouds. The Halo platform is a SaaS-based solution delivered as a metered service so it deploys in minutes, scales dynamically and you only pay for what you use. Halo is unique in that it shifts analytics processing from servers into the cloud, so it uses minimal resources on protected systems. This allows layered security to be deployed at every workload--servers, virtual machines, cloud instances and containers. The Halo platform offers a broad range of functions, so you can eliminate the management of numerous single-function point solutions. CloudPassage Halo solves these key security challenges: Workload Security, Automated Compliance, Security at DevOps Speed.
lllusive continuously discovers and automatically remediates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identities, including deployment of PAM and MFA, 1 in 6 enterprise endpoints holds exploitable identity risks. Illusive makes it easy for security teams to get visibility into the vulnerable identities sprawled across an organization`s endpoints and servers, then eliminate them or deploy deception-based detection techniques as a compensating control to stop attackers. Illusive has participated in over 140 red team exercises and has never lost one! Founded by nation state attackers, Illusive`s technology is trusted by large global financial companies, retailers, services organizations, and pharmaceutical companies.